make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 362.210671] eth0: renamed from r1h1 [ 362.252652] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 365.320691] eth0: renamed from r1h1 [ 365.362692] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 368.457696] eth0: renamed from r1h1 [ 368.499695] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 371.680758] eth0: renamed from r1h1 [ 371.720698] eth0: renamed from r2h1 [ 371.761730] eth1: renamed from r1h2 [ 371.801712] eth1: renamed from r2h2 [ 371.872342] br0: port 1(eth0) entered blocking state [ 371.872626] br0: port 1(eth0) entered disabled state [ 371.872889] eth0: entered allmulticast mode [ 371.873172] eth0: entered promiscuous mode [ 371.873711] br0: port 1(eth0) entered blocking state [ 371.873978] br0: port 1(eth0) entered forwarding state [ 371.887599] br0: port 2(eth1) entered blocking state [ 371.887887] br0: port 2(eth1) entered disabled state [ 371.888149] eth1: entered allmulticast mode [ 371.888444] eth1: entered promiscuous mode [ 371.888949] br0: port 2(eth1) entered blocking state [ 371.889218] br0: port 2(eth1) entered forwarding state [ 371.979600] br0: port 1(eth0) entered blocking state [ 371.979877] br0: port 1(eth0) entered disabled state [ 371.980137] eth0: entered allmulticast mode [ 371.980417] eth0: entered promiscuous mode [ 371.994725] br0: port 2(eth1) entered blocking state [ 371.995013] br0: port 2(eth1) entered disabled state [ 371.995274] eth1: entered allmulticast mode [ 371.995579] eth1: entered promiscuous mode [ 371.996058] br0: port 2(eth1) entered blocking state [ 371.996323] br0: port 2(eth1) entered forwarding state [ 372.102653] br0: port 1(eth0) entered blocking state [ 372.102944] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 374.486601] eth1: left allmulticast mode [ 374.486973] eth1: left promiscuous mode [ 374.487383] br0: port 2(eth1) entered disabled state [ 374.510690] eth0: left allmulticast mode [ 374.510910] eth0: left promiscuous mode [ 374.511121] br0: port 1(eth0) entered disabled state [ 374.607610] eth1: left allmulticast mode [ 374.607967] eth1: left promiscuous mode [ 374.608348] br0: port 2(eth1) entered disabled state [ 374.621652] eth0: left allmulticast mode [ 374.621866] eth0: left promiscuous mode [ 374.622259] br0: port 1(eth0) entered disabled state [ 375.160724] eth0: renamed from r1h1 [ 375.200753] eth0: renamed from r2h1 [ 375.243651] eth1: renamed from r1h2 [ 375.287724] eth1: renamed from r2h2 [ 375.358497] br0: port 1(eth0) entered blocking state [ 375.358800] br0: port 1(eth0) entered disabled state [ 375.359063] eth0: entered allmulticast mode [ 375.359345] eth0: entered promiscuous mode [ 375.359939] br0: port 1(eth0) entered blocking state [ 375.360206] br0: port 1(eth0) entered forwarding state [ 375.373944] br0: port 2(eth1) entered blocking state [ 375.374232] br0: port 2(eth1) entered disabled state [ 375.374494] eth1: entered allmulticast mode [ 375.374837] eth1: entered promiscuous mode [ 375.375359] br0: port 2(eth1) entered blocking state [ 375.375636] br0: port 2(eth1) entered forwarding state [ 375.466820] br0: port 1(eth0) entered blocking state [ 375.467099] br0: port 1(eth0) entered disabled state [ 375.467360] eth0: entered allmulticast mode [ 375.467664] eth0: entered promiscuous mode [ 375.480236] br0: port 2(eth1) entered blocking state [ 375.480513] br0: port 2(eth1) entered disabled state [ 375.480787] eth1: entered allmulticast mode [ 375.481070] eth1: entered promiscuous mode [ 375.481536] br0: port 2(eth1) entered blocking state [ 375.481809] br0: port 2(eth1) entered forwarding state [ 375.549597] br0: port 1(eth0) entered blocking state [ 375.549899] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 377.979665] eth1: left allmulticast mode [ 377.979890] eth1: left promiscuous mode [ 377.980114] br0: port 2(eth1) entered disabled state [ 377.992748] eth0: left allmulticast mode [ 377.993084] eth0: left promiscuous mode [ 377.993441] br0: port 1(eth0) entered disabled state [ 378.075598] eth1: left allmulticast mode [ 378.075975] eth1: left promiscuous mode [ 378.076327] br0: port 2(eth1) entered disabled state [ 378.085644] eth0: left allmulticast mode [ 378.086008] eth0: left promiscuous mode [ 378.086389] br0: port 1(eth0) entered disabled state [ 378.495727] eth0: renamed from r1h1 [ 378.537678] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 381.622668] eth0: renamed from r1h1 [ 381.663705] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 384.844706] eth0: renamed from r1h1 [ 384.884714] eth0: renamed from r2h1 [ 384.928664] eth1: renamed from r1h2 [ 384.969692] eth1: renamed from r2h2 [ 385.037811] br0: port 1(eth0) entered blocking state [ 385.038098] br0: port 1(eth0) entered disabled state [ 385.038363] eth0: entered allmulticast mode [ 385.038659] eth0: entered promiscuous mode [ 385.039204] br0: port 1(eth0) entered blocking state [ 385.039471] br0: port 1(eth0) entered forwarding state [ 385.052069] br0: port 2(eth1) entered blocking state [ 385.052350] br0: port 2(eth1) entered disabled state [ 385.052630] eth1: entered allmulticast mode [ 385.052915] eth1: entered promiscuous mode [ 385.053387] br0: port 2(eth1) entered blocking state [ 385.053667] br0: port 2(eth1) entered forwarding state [ 385.141164] br0: port 1(eth0) entered blocking state [ 385.141443] br0: port 1(eth0) entered disabled state [ 385.141759] eth0: entered allmulticast mode [ 385.142069] eth0: entered promiscuous mode [ 385.155693] br0: port 2(eth1) entered blocking state [ 385.155980] br0: port 2(eth1) entered disabled state [ 385.156240] eth1: entered allmulticast mode [ 385.156525] eth1: entered promiscuous mode [ 385.157016] br0: port 2(eth1) entered blocking state [ 385.157284] br0: port 2(eth1) entered forwarding state [ 385.219643] br0: port 1(eth0) entered blocking state [ 385.220148] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 387.626585] eth1: left allmulticast mode [ 387.626834] eth1: left promiscuous mode [ 387.627106] br0: port 2(eth1) entered disabled state [ 387.635661] eth0: left allmulticast mode [ 387.635916] eth0: left promiscuous mode [ 387.636141] br0: port 1(eth0) entered disabled state [ 387.719597] eth1: left allmulticast mode [ 387.719874] eth1: left promiscuous mode [ 387.720125] br0: port 2(eth1) entered disabled state [ 387.727645] eth0: left allmulticast mode [ 387.727893] eth0: left promiscuous mode [ 387.728158] br0: port 1(eth0) entered disabled state [ 388.255693] eth0: renamed from r1h1 [ 388.299688] eth0: renamed from r2h1 [ 388.340686] eth1: renamed from r1h2 [ 388.384674] eth1: renamed from r2h2 [ 388.458122] br0: port 1(eth0) entered blocking state [ 388.458408] br0: port 1(eth0) entered disabled state [ 388.458691] eth0: entered allmulticast mode [ 388.458986] eth0: entered promiscuous mode [ 388.459522] br0: port 1(eth0) entered blocking state [ 388.459816] br0: port 1(eth0) entered forwarding state [ 388.471785] br0: port 2(eth1) entered blocking state [ 388.472060] br0: port 2(eth1) entered disabled state [ 388.472320] eth1: entered allmulticast mode [ 388.472611] eth1: entered promiscuous mode [ 388.473053] br0: port 2(eth1) entered blocking state [ 388.473316] br0: port 2(eth1) entered forwarding state [ 388.557167] br0: port 1(eth0) entered blocking state [ 388.557444] br0: port 1(eth0) entered disabled state [ 388.557731] eth0: entered allmulticast mode [ 388.558016] eth0: entered promiscuous mode [ 388.570913] br0: port 2(eth1) entered blocking state [ 388.571181] br0: port 2(eth1) entered disabled state [ 388.571441] eth1: entered allmulticast mode [ 388.571726] eth1: entered promiscuous mode [ 388.572014] br0: port 2(eth1) entered blocking state [ 388.572275] br0: port 2(eth1) entered forwarding state [ 388.677592] br0: port 1(eth0) entered blocking state [ 388.677863] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 391.069637] eth1: left allmulticast mode [ 391.070025] eth1: left promiscuous mode [ 391.070397] br0: port 2(eth1) entered disabled state [ 391.082653] eth0: left allmulticast mode [ 391.082886] eth0: left promiscuous mode [ 391.083167] br0: port 1(eth0) entered disabled state [ 391.182615] eth1: left allmulticast mode [ 391.183031] eth1: left promiscuous mode [ 391.183352] br0: port 2(eth1) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' [ 391.192827] eth0: left allmulticast mode [ 391.193057] eth0: left promiscuous mode [ 391.193271] br0: port 1(eth0) entered disabled state xx__-> echo $? 0 xx__->